FREE Palo Alto Cheat Sheet in different formats and further FREE resources: netsums.com/resources
@maozkaufmann52552 ай бұрын
You are amazing. Funny to think nobody in this world has provided updated videos on how to do things with Palo Alto.
@netsumsАй бұрын
Thank you for the comment, I'm glad you like the videos!
@jmanc2179Сағат бұрын
Thank you great content! If you use the default management interface for communications then no need for rules to allow communications between windows user ID agent server and Palo firewall right?
@RishiRap11 ай бұрын
As usual, Great content! Always looking forward to your new meaningful and informational videos.
@netsums11 ай бұрын
Thank you for the comment, I'm glad you liked the video!
@TariqASheikh7 күн бұрын
Would be useful to have link for all pre-requisites etc.
@netsums7 күн бұрын
You're right. I'll take a look at it soon. Thank you!
@diwakarkumar3216 Жыл бұрын
Love from India. ❤ Your are doing great contribution for upcoming generation. Please make full course video. It will be helpful if you help me in enabling Google authenticator in GP-VPN❤❤❤
@netsums11 ай бұрын
Thank you for the lovely comnent, I will try!
@smakersify10 ай бұрын
Excellent buddy, subbed
@netsums10 ай бұрын
Thank you! I'm glad you liked it!
@diwakarkumar3216 Жыл бұрын
Please keep making videos on all topics
@netsums11 ай бұрын
I will try my best!
@normannueno28724 ай бұрын
Awesome!!!
@netsums4 ай бұрын
Thank you, I'm glad you liked the video. 😊
@blackknight9856 ай бұрын
Excellent video! just a quick question, how did you get rid of the warning message about API Key after committing the changes?
@netsums6 ай бұрын
Can you post here the warning message you're getting?
@RishiRap11 ай бұрын
You configured a security policy with zone "lab2" for both src and dst close to 9.50 timeline. Isn't Intra-zone policy is default and allows "all"? Please clarify. Thanks.
@netsums11 ай бұрын
You're 100% correct, this rule wouldn't be necessary with standard default rules. But I personally am not a big fan of intra-zone allow as default, so I have in my lab an override with a deny for my intra-zone default rule. So I had to add this rule. But nice caught! :-)
@fisa68354 ай бұрын
Hallo, I'd like to ask, can I use this way to allow users that already join domain (AD users) to bypass captive portal and non ad users has to go to captive portal?
@juliaperez99584 ай бұрын
Thank you, this is very helpful. With this setup, user mapping is working, but server monitoring under User-Identification-user mapping isn't. Do you have any suggestions to get server monitoring to work
@netsums4 ай бұрын
Thank you for the comment. You don't need to configure anything in the server monitoring if you have a windows based User-ID agent. If you are trying to configure the PAN-OS User-ID agent, I would suggest you to think about the windows based agent, in my experience it's a lot less problematic to setup.
@juliaperez99584 ай бұрын
@@netsums Thank you very much for the advice. I will give that a try.
@brianleb3 ай бұрын
How would I setup multiple firewalls to use the CA generated on one firewall?
@brianleb3 ай бұрын
Answer is to export the CA cert from the originating firewall and then import it on each additional PA and setup the in a Cert Profile and attach that to the UserID Connection Security
@ADempsey3 ай бұрын
If we use a public cert from globalsign will it be generated on the UserID server or from the Palo?
@netsums3 ай бұрын
You need to install the certificate on the User-ID server.
@潘群崴2 ай бұрын
Sorry to bother you, but I have a question. I have completed the User ID Agent configuration, and I can see the user information under MONITOR > User ID. However, only the user information is currently displayed. How can I configure it to display the group information as well?
@netsums2 ай бұрын
Hi. You probably need gouo mapping. Take a look at this video, there is a session there that I show how it can be configured: kzbin.info/www/bejne/hoapYpt3e5tjd7ssi=sKaytILFlLi2klYD Let me know later if the video could help you solve the problem. :-)
@Domesteron199810 ай бұрын
Idk what is wrong, for me not working redestribute status is "No"..
@netsums9 ай бұрын
Sorry for the late reply. Hard to say, many reasons: - Port 5007 not being allowed - Certificate not bein able to validate (does it work without certificate validation?). Use Packet Capture to debug it - Pre-shared Key not matching... What error messages are you receiving?
@KyleLilleyBPS7 ай бұрын
@@netsums **excellent** video, worked perfectly. only extra thing related to this fellas question is we needed to add a windows firewall rule to allow the 5007 traffic before it would allow the communication